INSIDER RISK INSIGHTS, NEWS, AND ANALYSIS
BLOG
![Insider Risk Insights - DTEX Blog](https://www.dtexsystems.com/wp-content/uploads/2021/02/DTEX_website_imagesBlog_Hero.jpg)
The Latest Insider Risk Insights
![How DTEX is Supporting National Security](https://www.dtexsystems.com/wp-content/uploads/2024/06/Mission-Possible-How-DTEX-is-Supporting-National-Security-from-the-Inside-Out-1-scaled.jpeg)
"Mission Possible": How DTEX is Supporting National Security from the Inside Out
When considering the most significant cyber threats to the public sector, many immediately think of foreign adversaries breaching federal agencies.
Read More![](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX_Banners_Insider-Risk-Report_r2_1200x627_opt2-1.png)
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read More![THREAT ADVISORY FOR DISRUPTING FOREIGN INTERFERENCE](https://www.dtexsystems.com/wp-content/uploads/2024/07/THREAT-ADVISORY-FOR-DISRUPTING-FOREIGN-INTERFERENCE-scaled.jpeg)
DTEX i³ Issues New Threat Advisory for Disrupting Foreign Interference
The DTEX Insider Intelligence and Investigations (i3) team has released a new threat advisory to help organizations detect, deter,…
Read More![Foreign Interference Case Study](https://www.dtexsystems.com/wp-content/uploads/2024/06/Foreign-Interference-Case-Study.png)
How Behavioral Intelligence Can Combat Foreign Interference
Foreign interference is arguably the biggest threat facing national security today, as adversaries increasingly weaponize insiders to advance their strategic…
Read More![Mitigating Third-Party Zoom Risk](https://www.dtexsystems.com/wp-content/uploads/2024/06/Mitigating-Third-Party-Zoom-Risk-scaled.jpeg)
DTEX i³ Issues Threat Advisory for Mitigating Third-Party Zoom Risk
Video conferencing applications like Zoom have become ubiquitous with the remote workforce, but they can also introduce a new vector…
Read More![DTEX i3 Threat Advisory Provides Detections for LOTL, C2 Abuse](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX-i3-Threat-Advisory-Provides-Detections-for-LOTL-C2-Abuse-scaled.jpeg)
DTEX i³ Threat Advisory Provides Detections for LOTL, C2 Abuse
Workspace applications are increasingly being weaponized as a Living off the Land (LOTL) technique, as threat actors find new ways…
Read More![](https://www.dtexsystems.com/wp-content/uploads/2024/04/DTEX_Banners_Insider-Risk-Report_r2_1200x627_opt2-1.png)
Countering Foreign Interference: 2024 Insider Risk Report Takeaways
There has been no shortage of incidents related to foreign interference and IP theft. From theft of…
Read More![DTEX i³ Threat Advisory Multiple Identities](https://www.dtexsystems.com/wp-content/uploads/2024/03/DTEX-i³-Threat-Advisory-Multiple-Identities-1-scaled.jpeg)
DTEX i³ Issues Threat Advisory for Detecting the Use of Multiple Identities
The DTEX i3 team has issued a new Threat Advisory following recent investigations linking the use of multiple personal accounts…
Read More![DTEX i³ reveals vulnerabilities and mitigations associated with common workforce web applications](https://www.dtexsystems.com/wp-content/uploads/2024/01/DTEX-i³-reveals-vulnerabilities-and-mitigations-associated-with-common-workforce-web-applications-scaled.jpeg)
DTEX i³ Issues Threat Advisory for Mitigating Insider Abuse of Insecure Web Apps
Web applications offer powerful workforce efficiencies, but they are not without their risks. Misconfiguration of web applications can open the…
Read More![Understanding pseudonymization and anonymization](https://www.dtexsystems.com/wp-content/uploads/2023/02/Understanding-pseudonymization-and-anonymization-3.jpg)
Pseudonymization vs. Anonymization
A common challenge organizations face is striking the balance between employee privacy and insider risk monitoring. Using pseudonymization, organizations can…
Read More![Pentagon ‘Critical Compromise’ Who is Keeping Score](https://www.dtexsystems.com/wp-content/uploads/2023/08/Pentagon-‘Critical-Compromise-Who-is-Keeping-Score.jpg)
Pentagon Compromise | The Most Effective Insider Threat Sensors Are People
DTEX i3 team confirms people are the most effective insider threat sensors; identifies several other early warning indicators. It’s been four…
Read More![Cyberbytes: The Insider Threat and The Real Risk to Enterprises](https://www.dtexsystems.com/wp-content/uploads/2023/07/Cyberbytes.jpeg)
CyberBytes Recap: The Insider Threat and the Real Risk to Enterprises
I recently sat down with CyberBytes podcast host and co-founder of Aspiron Search Joseph Cooper to discuss the insider…
Read More![INSIDER RISK LEGISLATION IS COMING ARE YOU PREPARED](https://www.dtexsystems.com/wp-content/uploads/2023/06/INSIDER-RISK-LEGISLATION-IS-COMING-ARE-YOU-PREPARED-2-scaled.jpg)
Insider Risk Legislation is Coming: Are You Prepared?
The rise of foreign interference and high-profile breaches has highlighted the need to address the human element in cybersecurity through…
Read More![INSIDER RISK DETECTION 101: MITIGATING UNINTENTIONAL INSIDER THREATS](https://www.dtexsystems.com/wp-content/uploads/2023/01/iStock-1219205308.jpg)
Massive Tech Layoffs Continue to Increase Insider Risks for Enterprises
The looming recession is driving big tech companies to reduce their workforce in 2023, with Microsoft being the latest to…
Read More